Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

The Impact of Auditing on Records Management Risk and Compliance Susan B. Whitmire, CRM, FAI Manager, Enterprise Records and Information Management BlueCross.
Saving Your Documents Can Save You Anne D. Harman, Esq. Bethany B. Swaton, Esq. Dinsmore & Shohl LLP 2100 Market Street, Wheeling (304)
Introduction to Records Management Policy
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
Litigation Holds: Don’t Live in Fear of Spoliation Jason CISO – University of Connecticut October 30, 2014 Information Security Office.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
Compliance, eDiscovery, Continuity and Migration made easy with SaaS Archiving Warren Roy, President & CEO, Global Relay.
Data Ownership Responsibilities & Procedures
Separate Domains of IT Infrastructure
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Security Controls – What Works
LBSC 708X The Record Nature of Electronic Records College of Information Studies.
VITA [Virginia Information Technologies Agency]
Developing a Records & Information Retention & Disposition Program:
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Session 3 – Information Security Policies
RECORDS MANAGEMENT City of Oregon City “ That was then… this is now!”
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Awareness Norfolk State University Policies.
SEC835 Database and Web application security Information Security Architecture.
By Helen Streck President/CEO Kaizen InfoSource LLC Litigation Readiness: Information Manager’s Role.
Electronic Communications State Owned System Mandates Presented by: Eileen Goldgeier.
Electronic Records Management: What Management Needs to Know May 2009.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
The Sedona Principles 1-7
Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (
Web (Website) Records Management. Agenda:  Brief Definitions and Outline – NARA  Vendors  Member Q & A  Who has formal policies for web/website management?
Final Coverage Topic 4: INFORMATION RESOURCES and INFORMATION SYSTEMS By Dr. Faustino Reyes.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Information Systems Security Operational Control for Information Security.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Records Management Is Not an Option Anymore
Implementing the Standard on digital recordkeeping.
Information Assurance Policy Tim Shimeall
S-1 © RGP & UW-CISA 2010 Business & Technology Environment Summer 2010 Robert G Parker.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Digital Government Summit
Chap1: Is there a Security Problem in Computing?.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
ISO/IEC 27001:2013 Annex A.8 Asset management
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Record Retention to Manage Risk F. Jay Meyer Vice President & Senior Attorney TD Banknorth, N.A. Portland, Maine.
Chang, Wen-Hsi Division Director National Archives Administration, 2011/3/18/16:15-17: TELDAP International Conference.
Records Management Training - Department Records Liaison.
ARMA VI - NANAIMO 2016 David Young Records Management Archivist University of Victoria Electronic Records as Documentary Evidence CGSB‐72.34‐2015 (To supersede.
Records Management Reality
Blackboard Security System
Leveraging the Data Map – A Case Study November 15, 2016
Security Standard: “reasonable security”
Retain Data Commensurate with Value
Managing the IT Function
Litigation Holds: Don’t Live in Fear of Spoliation
Final HIPAA Security Rule
County HIPAA Review All Rights Reserved 2002.
Records Retention and Its Effects on Discovery
Introduction to the PACS Security
Presentation transcript:

Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery

Agenda Information management Records management Discussant

The EDI Trinity Data Information Records

Sources of ESI Enterprise databases Web sites File systems – Organized – Shared – Personal Backup tapes Voic Instant messaging File systems – Metadata – Deleted files Security badge access logs Personally owned systems – Files – Cloud services – Gmail/Hotmail/… – Dropbox/Google Docs/… – Facebook – Twitter – SMS

Formal and Informal Social Networks

The Activity Trinity Use Retain – Proactive (records management) – Reactive (legal hold) Destroy – Reasonable (cost, business risk, …) – “Bad faith” (litigation risk)

Internal Stakeholders Business functions – Operations – Sales – Management (audit, …) – Support functions (purchasing, human resources, …) Information technology staff Records management staff Legal staff

Who to Believe?

Replication Business continuity Disaster recovery Parallel access Latency mitigation Leakage – Convenience – Unauthorized disclosure – Theft – Disposal

IT Support Functions Management (CIO, CTO, projects, audit, …) Acquisition (systems, services, outsourcing, …) Development (software, Web, migration, …) Operations (servers, network, backups, …) Security (network, data, …) Support (training, help desk, …)

Management Structures Execution – Centralized – Distributed Control – Centralized – Distributed Network architectures – Workstations – Cloud – Peer-to-peer Centralized Functions – Relational database – Servers Mail Web – Backups

Critical Events Hardware refresh – Migration, concurrent operations System upgrade – Backward compatibility Change of outsourcing contractor – Service Level Agreement (SLA) continuation Termination of employment – ESI, tacit knowledge, file encryption passwords

Risk Management Awareness – Training – Detection – Red team Mitigation – Proactive Technology Policy Process – Reactive

Information Management Policies Access control (systems, FERPA, classified, …) Change control (Content, authorization, …) Acceptable use (personal use, malicious use, …) Dissemination control (Web sites, blogs, …) System integrity (wireless devices, media, …) Privacy (rights, assurances, …) Backup management (periodicity, restoration, …) Legal holds

Sedona Guidelines 1.Information and records management is important in the electronic age 2.An organization’s information and records management policies and procedures should be realistic, practical, and tailored to the circumstances of the organization 3.An organization need not retain all electronic information ever generated or received

Sedona Guidelines (cont.) 4.An organization adopting an information and records management policy should also develop procedures that address the creation, identification, retention, retrieval and ultimate disposition or destruction of information and records 5.An organizations policies and procedures must mandate the suspension of ordinary destruction practices and procedures as necessary to comply with preservation obligations related to actual or reasonably anticipated litigation, government investigation or audit

Defining “Records” ISO :2001: Information created, received and maintained as evidence and information by an organization or person in pursuance of legal obligations or in the transactions of business” ICA Committee on Electronic Records: A recorded information produced or received in the initiation, conduct or completion of an institutional or individual activity and that comprises content, content and structure sufficient to provide evidence of the activity.

Records Management “Schedules” – What – How long – (Why) Classification – Specialized staff (e.g., executive assistant) – End-user (e.g., for ) – Embedded rules (hand-written or learned)

Information Life Cycle

Famous Last Words Word of the day: spoliation – Destruction or altering of evidence “There are some communications that should not be put in written form” – (hmmm … how is it that we know this was said?)